Abstract
In recent years, the block chain technology considered as adaptable compared to other techniques. Many of the industry, understanding the block chain technology is utilizing for financial services and its transactions but it also effective in other sectors like healthcare industry. Existing methods are hazardous; where, data stored in outsider servers might be eavesdropped, stolen, or legitimate way. Nevertheless, the trustworthiness of storage server architecture relies upon dependability of single service provider. The security manager’s detect the which are client(s) can get to a specific part of the data. However, the existing method is increasingly failed to maintain access control, record transaction authentications with anonymous interruptions. The paper proposes a secure and efficient health record transaction utilizing block chain (SEHRTB) algorithm for addressing health record information transaction between the patient, doctor, service providers, and institutions in a privacy-preserving way. The work provides a healthcare sector with block chain technology. In health care, the work enables the patient to control and share their health record into cloud storage easily in a secured manner without any violation of privacy. It provides an effective way to ensure the patient data privately in intelligent health care systems. The paper indicates the system built in a decentralized computing system to assure trusted third party for conducting computation over patient data without violating the privacy. Based on Experimental result, the SEHRTB algorithm reduces 2.05 latency, 1.08 ET (execution time), and improves 30.5% throughput compared than existing approaches.
Similar content being viewed by others
References
Aitzhan NZ, Svetinovic D (2016) Security and privacy in decentralized energy trading through multi-signatures, block chain, and anonymous messaging streams. IEEE Trans Dependable Secure Comput 15(5):840–852. https://doi.org/10.1109/TDSC.2016.2616861
Cha SC, Yeh KH (2018) An ISO/IEC 15408-2 compliant security auditing system with block chain technology. IEEE Conf Commun Netw Security CNS. https://doi.org/10.1109/CNS.2018.8433185
Christidis K, Devetsikiotis M (2016) block chains and smart contracts for the internet of things. IEEE Access. https://doi.org/10.1109/ACCESS.2016.2566339
D’Arienzo MP, Dudin AN, Dudin SA, Manzo R (2019) Analysis of a retrial queue with group service of impatient customers. J Ambient Intell Hum Comput. https://doi.org/10.1007/s12652-019-01318-x
Dinh TTA, Liu R, Zhang M, Chen G, Ooi BC, Wang J (2018) Untangling block chain: a data processing view of block chain systems. IEEE Trans Knowl Data Eng 30(7):1366–1385
Dorri A, Steger M, Kanhere SS, Jurdak R (2017) Block chain: a distributed solution to automotive security and privacy. IEEE Commun Mag 55(12):119–125. https://doi.org/10.1109/MCOM.2017.1700879
Eyal I, Gencer AE, Sirer EG, Van Renesse R (2016) Bitcoin-NG: a scalable block chain protocol. Symposium on Networked Systems Design and Implementation (NSDI), pp 45–59
Ferdous MS, Margheri A, Paci F, Yang M, Sassone V (2017) Decentralised runtime monitoring for access control systems in cloud federations. IEEE Int Conf Distrib Comput Syst ICDCS. https://doi.org/10.1109/ICDCS.2017.178
Gervais A, Karame GO, Wüst K, Glykantzis V, Ritzdorf H, Capkun S (2016) On the security and performance of proof of work block chains. Proc ACM SIGSAC Conf Comput Commun Security. https://doi.org/10.1145/2976749.2978341
Huh S, Cho S, Kim S (2017) Managing IoT devices using block chain platform. Int Conf Adv Commun Technol ICACT. https://doi.org/10.23919/ICACT.2017.7890132
Iansiti M, Lakhani KR (2017) The truth about block chain. Harvard Business Rev 95(1):118–127
Kiayias A, Panagiotakos G (2015) Speed-security tradeoffs in block chain protocols. IACR Cryptology ePrint Archive, pp 1–19
Kosba A, Miller A, Shi E, Wen Z, Papamanthou C (2016) Hawk: the block chain model of cryptography and privacy-preserving smart contracts. IEEE Symp Security Privacy SP. https://doi.org/10.1109/sp.2016.55
Qu C, Tao M, Zhang J, Hong X, Yuan R (2018) Block chain-based credibility verification method for IoT entities. Security Commun Netw. https://doi.org/10.1155/2018/7817614
Shafagh H, Burkhalter L, Hithnawi A, Duquennoy S (2017) Towards block chain-based auditable storage and sharing of IoT data. Proc Cloud Comput Security Workshop. https://doi.org/10.1145/3140649.3140656
Tian F (2016) An agri-food supply chain traceability system for China based on RFID and block chain technology. Int Conf Service Syst Service Manag ICSSSM. https://doi.org/10.1109/ICSSSM.2016.7538424
Tosh DK, Shetty S, Liang X, Kamhoua CA, Kwiat KA, Njilla L (2017) Security implications of block chain cloud with analysis of block withholding attack. Proc IEEE/ACM Int Symp Cluster Cloud Grid Comput. https://doi.org/10.1109/CCGRID.2017.111
Vukolić M (2015) The quest for scalable block chain fabric: proof-of-work vs. BFT replication. International Workshop on Open Problems in Network Security, pp 112–125
Xu X, Weber I, Staples M, Zhu L, Bosch J, Bass L, Rimba P (2017) A taxonomy of block chain-based systems for architecture design. IEEE Int Conf Softw Archit ICSA. https://doi.org/10.1109/ICSA.2017.33
Yu X, Tan Y, Sun Z, Liu J, Liang C, Zhang Q (2019) A fault-tolerant and energy-efficient continuous data protection system. J Ambient Intell Hum Comput 10(8):2945–2954. https://doi.org/10.1007/s12652-018-0726-2
Zheng Z, Xie S, Dai HN, Wang H (2016) Block chain challenges and opportunities: a survey. Int J Web Grid Serv 14(4):352–375. https://doi.org/10.1504/IJWGS.2018.095647
Acknowledgements
The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through General Research Project under Grant number (G.R.P-76-1440). I would like to thank King Khalid university for the necessary support to lead this paper, we thank our colleagues who sustained greatly assisted this research. We would also like to show our gratitude to for sharing their pearls of wisdom with us during this research, and we thank “anonymous” reviewers for their so-called insights.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Mubarakali, A., Bose, S.C., Srinivasan, K. et al. Design a secure and efficient health record transaction utilizing block chain (SEHRTB) algorithm for health record transaction in block chain. J Ambient Intell Human Comput (2019). https://doi.org/10.1007/s12652-019-01420-0
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s12652-019-01420-0